From a96217d24e047d0b62ca15cf6e98ffba285152f0 Mon Sep 17 00:00:00 2001 From: = <=> Date: Sun, 15 Dec 2019 03:08:08 +0100 Subject: [PATCH] Added todo --- report.tex | 1 + 1 file changed, 1 insertion(+) diff --git a/report.tex b/report.tex index b4a436e..da02c0c 100644 --- a/report.tex +++ b/report.tex @@ -129,6 +129,7 @@ h_i = \end{cases} $$ \adv{B} then sets $\alpha = y_0 \cdot a^{n+1}$. $PK$ is then defined as the scheme dictates where the only oddity is $e(g,g)^\alpha$, which can be computed as $e(g^a,g^{a^{n}})^{y_0}$ due to the definition of $\alpha$. $PK$ is sent to \adv{A}. +% TODO: Finish this proof \section{Implementation of Schemes} \subsection{Identity-Based Encryption}